Results 21 to 30 of about 97,853 (291)
Message composition and its application to event- driven system construction [PDF]
Due to the object-oriented technology of event-driven system construction, the message composition may be used. Rules of message composition are alike those of program statement composition.
A. Colesnicov
doaj
Disaster multi-robot has a significant role in a disaster area to do many tasks like detection of fire, search and rescue of victims, etc. It needs to build good communication between the operator and multi-robot and among multi-robot themselves to ...
Muhammad Ikrar Yamin +2 more
doaj +1 more source
A multi-threaded data distribution model is proposed to reduce the packet loss rate caused by slow subscribers and slow connections in traditional data distribution services.
ZHENG Jia-cheng, ZHANG Ya-nan
doaj +1 more source
A Stochastic Broadcast Pi-Calculus [PDF]
In this paper we propose a stochastic broadcast PI-calculus which can be used to model server-client based systems where synchronization is always governed by only one participant. Therefore, there is no need to determine the joint synchronization rates.
A. Aldini +25 more
core +5 more sources
The Queueing Model MAP|PH|1|N with Feedback Operating in a Markovian Random Environment
Queueing systems with feedback are well suited for the description of message transmission and manufacturing processes where a repeated service is required. In the present paper we investigate a rather general single server queue with a Markovian Arrival
A.N. Dudin +4 more
doaj +1 more source
A traffic light control method based on multi-agent deep reinforcement learning algorithm
Intelligent traffic light control (ITLC) algorithms are very efficient for relieving traffic congestion. Recently, many decentralized multi-agent traffic light control algorithms are proposed.
Dongjiang Liu, Leixiao Li
doaj +1 more source
Novel Feature Extraction Method for Detecting Malicious MQTT Traffic Using Seq2Seq
Owing to their wide application, Internet of Things systems have been the target of malicious attacks. These attacks included DoS, flood, SlowITe, malformed, and brute-force attacks. A dataset that includes these attacks was recently released.
Sunoh Choi, Jaehyuk Cho
doaj +1 more source
An Efficient and Low-Latency RPL Cross-Layer Optimization Mechanism [PDF]
The limitations of routing metrics in RPL in Low-power and Lossy Networks(LLN) lead to imbalanced network topology and unreasonable data transmission path.
YAO Yukun, ZHU Kelan, YANG Di, ZHAO Zijun
doaj +1 more source
VCube-PS: A Causal Broadcast Topic-based Publish/Subscribe System [PDF]
In this work we present VCube-PS, a topic-based Publish/Subscribe system built on the top of a virtual hypercube-like topology. Membership information and published messages are broadcast to subscribers (members) of a topic group over dynamically built ...
Arantes, Luciana +4 more
core +3 more sources
Improvement Design for Distributed Real-Time Stream Processing Systemsb
In the era of Big Data, typical architecture of distributed real-time stream processing systems is the combination of Flume, Kafka, and Storm. As a kind of distributed message system, Kafka has the characteristics of horizontal scalability and high ...
Wei Jiang, Liu-Gen Xu, Hai-Bo Hu, Yue Ma
doaj +1 more source

